san

Results 1076 - 1100 of 1160Sort Results By: Published Date | Title | Company Name
By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
Many of today's enterprise midrange arrays boast of integration with VMware vSphere VAAI primitives, boot from SAN protocols and snapshot functionality. But in the case of the HP 3PAR F200 and F400 models, this is only where their integration begins. HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 3par, vsphere integration, vm density, vmware srm, storage capacity, san, load balancing, snapshots
     HP and Intel® Xeon® processors
By: MicroStrategy     Published Date: Aug 21, 2019
Ready or not, the future is here. For enterprise organizations, it must be a data-driven one. Whoever can use technology to transform the customer experience, and be the first to discover and deliver on new business models, will be the disruptor. Those who can’t, the disrupted in this period known as the “era of Digital Darwinism.” The future belongs to the Intelligent Enterprise which anticipates constantly evolving regulatory, technological, market, and competitive challenges and turns them into opportunity and profit. It delivers a single version of the truth and agility. It connects to any data and distributes reports to thousands. The Intelligent Enterprise goes beyond business intelligence, delivering transformative insight to every user, constituent and partner. Are most organizations there yet? As brands hone and focus their 2020 (and even 2030) vision, MicroStrategy has surveyed 500 enterprise analytics professionals on the state of their organization’s analytics initiatives.
Tags : 
     MicroStrategy
By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
     dvsAnalytics
By: Dell Storage     Published Date: Apr 21, 2011
The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments. (39 mins)
Tags : dell compellent, webinar, virtual storage platform, vmware virtual servers, storage center san, disk capacity, disaster recovery
     Dell Storage
By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage, virtual machine
     Dell Storage
By: Dell Storage     Published Date: Apr 21, 2011
Using Microsoft Server Virtualization and Dell Compellent Storage Virtualization to Improve Delivery of Infrastructure as a Service.
Tags : dell compellent, provisioning, private cloud, microsoft server virtualization, storage virtualization, infrastructure, storage center, san
     Dell Storage
By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
     DataCore Software
By: Kaon     Published Date: Jul 07, 2011
In this complimentary white paper, discover how new interactive technologies allow companies to obtain quick ROIs - in the hundreds of thousands - while creating emotional customer connections at events. Learn how your 2011 marketing programs will generate greater ROI with new interactive marketing technologies.
Tags : kaon interactive, roi, marketing technologies, virtual product demonstrations, trade show trends, sales team, virtual technology
     Kaon
By: Dell Storage     Published Date: Nov 02, 2011
Private cloud computing advances the delivery of efficient, agile IT infrastructure allowing enterprises to plan incremental enhancements to existing infrastructure, and the right SAN.
Tags : technology, dell, san foundation, cloud deployment, data center, data management
     Dell Storage
By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
     Dell Storage
By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
     Symantec
By: Symantec     Published Date: Oct 08, 2012
Multi-use certificates make it much easier to deploy multiple secure services both internally and externally and have distinct advantages in lowering costs and reducing resources.
Tags : wildcard, san, ssl, symantec, security
     Symantec
By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, security
     McAfee
By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, security
     McAfee
By: Datto Inc.     Published Date: Jan 31, 2013
You can even conquer a Superstorm when all the pieces come together. Read how the entire Datto team, from product and technical support to the CEO, worked with Partners and their clients to make it through Sandy with data intact and minimal downtime.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
     Datto Inc.
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Taneja Group Solution Profile takes a closer look at what business continuity means in a storage system, and examines the approaches that vendors typically take to providing it. This paper looks into HP3PAR StoreServ 7000 and more.
Tags : san storage, intel, intel, hp 3par, hp storeserv
     Sponsored by HP and Intel® Xeon® processors
By: Salesforce.com     Published Date: Oct 14, 2013
Register for a Dreamforce Free Keynote and Expo Pass and learn first-hand how to connect with your customers in a whole new way. Hear about the future of cloud computing from thought leaders Get hands on with 1,000+ cloud solutions Network with thousands of innovators from every industry, at the world’s largest tech event
Tags : keynote, expo, dreamforce, force.com, salesforce.com, best practices, future of cloud computing, crm, cloud solutions
     Salesforce.com
By: Salesforce.com     Published Date: Oct 22, 2013
Register for a Dreamforce Free Keynote and Expo Pass and learn first-hand how to connect with your customers in a whole new way. Hear about the future of cloud computing from thought leaders Get hands on with 1,000+ cloud solutions Network with thousands of innovators from every industry, at the world’s largest tech event
Tags : keynote, expo, dreamforce, force.com, salesforce.com, best practices, future of cloud computing, crm, cloud solutions
     Salesforce.com
By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware, security
     Norse
By: Oracle     Published Date: Nov 15, 2016
La mutation numérique impacte l’ensemble des activités de l’entreprise. L’accès à l’avis de ses pairs, à la connaissance, ainsi que les capacités de libre-service, presque partout et à partir de quasiment n’importe quel appareil, ont radicalement transformé la manière dont nous gérons nos entreprises et menons nos vies.
Tags : 
     Oracle
By: Cisco     Published Date: Sep 16, 2015
Modern manufacturers are adopting new plant architectures that enable a portfolio of enhanced and new capabilities.
Tags : manufacturing, architectures, supply chain, responsiveness
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : technology, manufacturing, management infrastructure
     Cisco
By: NAVEX Global     Published Date: Jan 11, 2018
NAVEX Global recommande l’utilisation d'un logiciel (tel que le logiciel de gestion des incidents EthicsPoint™) pour bénéficier d'une approche cohérente de recueil de données et d’outils applicables à l’ensemble de l’entreprise pour gérer plusieurs programmes de signalement. Les utilisateurs sont ainsi en mesure d’identifier facilement les tendances concrètes, d’atténuer les risques et de gérer un programme efficace de gestion des incidents où qu’ils se trouvent, tout en restant ouverts aux audits et informés des évolutions constantes de leur environnement professionnel. Un système solide de gestion des incidents n’est pas seulement essentiel pour susciter l’implication des employés et développer un climat de confiance au sein d'une entreprise, c’est également une composante cruciale de protection des employés, de la réputation et de la santé financière de l’entreprise.
Tags : planification, mise en ceuvre, evaluation, ressources, supplementaires, navex
     NAVEX Global
Start   Previous    33 34 35 36 37 38 39 40 41 42 43 44 45 46 47    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com